نتایج جستجو برای: waveguide to ssl transition

تعداد نتایج: 10682404  

2009
David Wagner Bruce Schneier

The SSL protocol is intended to provide a prac tical application layer widely applicable connection oriented mechanism for Internet client server com munications security This note gives a detailed tech nical analysis of the cryptographic strength of the SSL protocol A number of minor aws in the protocol and several new active attacks on SSL are presented however these can be easily corrected w...

Journal: :Computer Communications 2006
Rolf Oppliger Ralf Hauser David A. Basin

Man-in-the-middle attacks pose a serious threat to SSL/TLSbased electronic commerce applications, such as Internet banking. In this paper, we argue that most deployed user authentication mechanisms fail to provide protection against this type of attack, even when they run on top of SSL/TLS. As a possible countermeasure, we introduce the notion of SSL/TLS session-aware user authentication, and p...

2014
Ruo Du Ting Zhong Wei-Qiang Zhang Ping Song Wen-Ding Song Yang Zhao Chao Wang Yi-Qun Tang Xuan Zhang Qiang Zhang

In the present study, we prepared a novel delivery system of iRGD (CRGDK/RGPD/EC)-modified sterically stabilized liposomes (SSLs) containing conjugated linoleic acid-paclitaxel (CLA-PTX). The anti-tumor effect of iRGD-SSL-CLA-PTX was investigated on B16-F10 melanoma in vitro and in vivo. The in vitro targeting effect of iRGD-modified SSLs was investigated in a real-time confocal microscopic ana...

2014
Tyler Nichols Adam Bates Joe Pletcher Braden Hollembaek Dave Tian Abdulrahman Alkhelaifi

Recent discoveries of widespread vulnerabilities in the SSL/TLS protocol stack, particular with regard to the verification of server certificates, has left the security of the Internet’s communications in doubt. Newly proposed SSL trust enhancements address many of these vulnerabilities, but are slow to be deployed and do not solve the problem of securing existing software. In this work, we pro...

2005
André Adelsbach Sebastian Gajek Jörg Schwenk

Today the standard means for secure transactions in the World Wide Web (WWW) are the SSL/TLS protocols, which provide secure (i.e., private and authentic) channels between browsers and servers. As protocols SSL/TLS are considered secure. However, SSL/TLS’s protection ends at the “transport/session layer” and it is up to the application (here web browsers) to preserve the security offered by SSL...

2007
Sebastian Gajek Lijun Liao Bodo Möller Jörg Schwenk

Key establishment is essential for many applications of cryptography. Its purpose is to negotiate keys for other cryptographic schemes, usually for encryption and authentication. In a web services context, WS-SecureConversation has been specified to make use of negotiated keys. The most popular key establishment scheme in the Internet is the (handshake protocol of the) Secure Socket Layer or Tr...

Journal: :Computer Networks 2007
Jordi Guitart David Carrera Vicenç Beltran Jordi Torres Eduard Ayguadé

Uncontrolled overload can lead e-commerce applications to considerable revenue losses. For this reason, overload prevention in these applications is a critical issue. In this paper we present a complete characterization of secure e-commerce applications scalability to determine which are the bottlenecks in their performance that must be considered for an overload control strategy. With this inf...

1993
Belhassen Zouari Serge Haddad Mohamed Taghelit

This paper deals with two important aspects of communicat ion protocols namely specificationnand verification.We present a new variant of the Formal Description Techni que Estelle called SSL which has the semantics of a High-level Petri net model. Such a semantics enables to apply efficient proof methods in order to automatically verify communication prot ocol properties. SSL is mainly characte...

2012
Johanna Amann Matthias Vallentin Robin Sommer

Much of the Internet's end-to-end security relies on the SSL protocol along with its underlying certificate infrastructure. We offer an in-depth study of real-world SSL and X.509 deployment characteristics from an unprecedented vantage point, based on a data set of more than 1.4 billion SSL sessions collected at the border of five operational sites. Our contributions are twofold: First, we revi...

2012
D. Madhavi M. Ashok Kumar

Secure Session Layer (SSL) and Transport Layer Security (TLS) are the two secure layer protocols in all of current web applications on a network. This paper focuses on SSL, TLS and how handshaking mechanism has been implemented in both SSL and TLS. Further, describes about the generation of keys and certificates.

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید